The listings featured on this site are from companies from which this site receives compensation and some are co-owned by our parent company. This influence: Rank and manner in which listings are presented.
Learn more
The How To Guide was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on The How To Guide are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Latest News

Apple has been instructed by UK authorities to create a backdoor in its iCloud encryption, as announced by the Washington Post. The directive, issued under the Investigatory Powers Act, would grant the government access to encrypted user data, affecting iCloud users not just in the UK, but

Anka Markovic Borak First published on February 13, 2025

Cybersecurity Researcher, Jeremiah Fowler, discovered and reported to vpnMentor about a non-password-protected database that contained nearly 2.7 billion records belonging to Mars Hydro — a China-based company offering IoT grow lights and software applications that allow users worldwide to control

Jeremiah Fowler First published on February 12, 2025

Feroot Security has uncovered hidden code in DeepSeek AI that transmits user data directly to China Mobile servers, raising national security concerns. The cybersecurity firm’s discovery was featured on Good Morning America, prompting calls for immediate government action. Feroot’s cybersecurity

Hendrik Human First published on February 11, 2025

Malicious apps designed to steal cryptocurrency have made their way into Apple’s App Store and Google Play, marking the first known case of such malware successfully bypassing Apple’s strict security review process. According to cybersecurity firm Kaspersky, which first reported the findings,

Husain Parvez First published on February 06, 2025

The Identity Theft Resource Center (ITRC) reported 3,158 data compromises in 2024, just 44 incidents shy of 2023’s record high. While the total number of breaches remained nearly unchanged, victim notices surged 312% to 1.7 billion, driven largely by 6 mega-breaches that each affected at least 100

Hendrik Human First published on February 03, 2025

NordVPN has launched a new protocol called NordWhisper, designed to help bypass network restrictions that typically block VPN connections. The company announced that the protocol will allow for a smoother and more reliable browsing experience in environments where traditional VPNs are often

Husain Parvez First published on January 31, 2025

TalkTalk, a major UK telecom provider, is investigating a data breach involving the potential theft of personal information belonging to millions of its customers. The breach reportedly originated from a third-party supplier's system and was discovered on January 21. A hacker operating under the

Anka Markovic Borak First published on January 30, 2025